-
1
-
-
38049061524
-
-
Backes, M., Müller-Quade, J., Unruh, D.: On the necessity of rewinding in secure multiparty computation. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 157-173. Springer, Heidelberg (2007)
-
Backes, M., Müller-Quade, J., Unruh, D.: On the necessity of rewinding in secure multiparty computation. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 157-173. Springer, Heidelberg (2007)
-
-
-
-
2
-
-
33746028196
-
Perfect privacy for two-party protocols
-
Feigenbaum, J, Merritt, M, eds, American Mathematical Society
-
Beaver, D.: Perfect privacy for two-party protocols. In: Feigenbaum, J., Merritt, M. (eds.) Proceedings of DIMACS Workshop on Distributed Computing and Cryptography, vol. 2, pp. 65-77. American Mathematical Society (1989)
-
(1989)
Proceedings of DIMACS Workshop on Distributed Computing and Cryptography
, vol.2
, pp. 65-77
-
-
Beaver, D.1
-
3
-
-
84957064831
-
The all-or-nothing nature of two-party secure computation
-
Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
-
Beimel, A., Malkin, T., Micali, S.: The all-or-nothing nature of two-party secure computation. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 80-97. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 80-97
-
-
Beimel, A.1
Malkin, T.2
Micali, S.3
-
5
-
-
35248854495
-
On the limitations of universally composable two-party computation without set-up assumptions
-
Biham, E, ed, EUROCRYPT 2003, Springer, Heidelberg
-
Canetti, R., Kushilevitz, E., Lindell, Y.: On the limitations of universally composable two-party computation without set-up assumptions. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
-
-
Canetti, R.1
Kushilevitz, E.2
Lindell, Y.3
-
6
-
-
0024860209
-
-
Chor, B., Kushilevitz, E.: A zero-one law for boolean privacy (extended abstract). In: STOC, pp. 62-72. ACM, New York (1989)
-
Chor, B., Kushilevitz, E.: A zero-one law for boolean privacy (extended abstract). In: STOC, pp. 62-72. ACM, New York (1989)
-
-
-
-
7
-
-
71149116146
-
-
Goldreich, O., Micali, S.,Wigderson, A.: Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. J. ACM 38(3), 691-729 (1991); Preliminary version in FOCS 1986
-
Goldreich, O., Micali, S.,Wigderson, A.: Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. J. ACM 38(3), 691-729 (1991); Preliminary version in FOCS 1986
-
-
-
-
8
-
-
0024866742
-
-
STOC, pp, ACM Press, New York 1989
-
Impagliazzo, R., Rudich, S.: Limits on the provable consequences of one-way permutations. In: STOC, pp. 44-61. ACM Press, New York (1989)
-
Limits on the provable consequences of one-way permutations
, pp. 44-61
-
-
Impagliazzo, R.1
Rudich, S.2
-
9
-
-
51849102397
-
Founding cryptography on oblivious transfer - efficiently
-
Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
-
Ishai, Y., Prabhakaran, M., Sahai, A.: Founding cryptography on oblivious transfer - efficiently. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 572-591. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 572-591
-
-
Ishai, Y.1
Prabhakaran, M.2
Sahai, A.3
-
10
-
-
84898989941
-
-
Kilian, J.: Founding cryptography on oblivious transfer. In: STOC, pp. 20-31. ACM, New York (1988)
-
Kilian, J.: Founding cryptography on oblivious transfer. In: STOC, pp. 20-31. ACM, New York (1988)
-
-
-
-
11
-
-
0003931157
-
-
PhD thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology
-
Kilian, J.: Uses of Randomness in Algorithms and Protocols. PhD thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology (1989)
-
(1989)
Uses of Randomness in Algorithms and Protocols
-
-
Kilian, J.1
-
12
-
-
70350691642
-
-
Kilian, J.: A general completeness theorem for two-party games. In: STOC, pp. 553-560. ACM, New York (1991)
-
Kilian, J.: A general completeness theorem for two-party games. In: STOC, pp. 553-560. ACM, New York (1991)
-
-
-
-
13
-
-
0033706604
-
More general completeness theorems for secure two-party computation
-
ACM, New York
-
Kilian, J.: More general completeness theorems for secure two-party computation. In: Proc. 32nd STOC, pp. 316-324. ACM, New York (2000)
-
(2000)
Proc. 32nd STOC
, pp. 316-324
-
-
Kilian, J.1
-
14
-
-
0033725451
-
Reducibility and completeness in private computations
-
Kilian, J., Kushilevitz, E., Micali, S., Ostrovsky, R.: Reducibility and completeness in private computations. SIAM J. Comput. 29(4), 1189-1208 (2000)
-
(2000)
SIAM J. Comput
, vol.29
, Issue.4
, pp. 1189-1208
-
-
Kilian, J.1
Kushilevitz, E.2
Micali, S.3
Ostrovsky, R.4
-
17
-
-
0024768184
-
-
Kushilevitz, E.: Privacy and communication complexity. In: FOCS, pp. 416-421. IEEE, Los Alamitos (1989)
-
Kushilevitz, E.: Privacy and communication complexity. In: FOCS, pp. 416-421. IEEE, Los Alamitos (1989)
-
-
-
-
18
-
-
35048903637
-
-
Lindell, Y.: Lower bounds for concurrent self composition. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 203-222. Springer, Heidelberg (2004)
-
Lindell, Y.: Lower bounds for concurrent self composition. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 203-222. Springer, Heidelberg (2004)
-
-
-
-
19
-
-
70350679063
-
Complexity of multiparty computation problems: The case of 2-party symmetric secure function evaluation. Cryptology ePrint Archive
-
Report 2008/454
-
Maji, H., Prabhakaran, M., Rosulek, M.: Complexity of multiparty computation problems: The case of 2-party symmetric secure function evaluation. Cryptology ePrint Archive, Report 2008/454 (2008), http://eprint.iacr.org/
-
(2008)
-
-
Maji, H.1
Prabhakaran, M.2
Rosulek, M.3
-
20
-
-
51849126899
-
Cryptographic complexity of multi-party computation problems: Classifications and separations
-
Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
-
Prabhakaran, M., Rosulek, M.: Cryptographic complexity of multi-party computation problems: Classifications and separations. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 262-279. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 262-279
-
-
Prabhakaran, M.1
Rosulek, M.2
-
21
-
-
0020312165
-
Protocols for secure computation
-
IEEE, Los Alamitos
-
Yao, A.C.: Protocols for secure computation. In: Proc. 23rd FOCS, pp. 160-164. IEEE, Los Alamitos (1982)
-
(1982)
Proc. 23rd FOCS
, pp. 160-164
-
-
Yao, A.C.1
|